[go: up one dir, main page]

CN111224985B - Communication Protocol Credibility Verification Method - Google Patents

Communication Protocol Credibility Verification Method Download PDF

Info

Publication number
CN111224985B
CN111224985B CN202010011586.7A CN202010011586A CN111224985B CN 111224985 B CN111224985 B CN 111224985B CN 202010011586 A CN202010011586 A CN 202010011586A CN 111224985 B CN111224985 B CN 111224985B
Authority
CN
China
Prior art keywords
verification
data set
formal
protocol
requirements
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN202010011586.7A
Other languages
Chinese (zh)
Other versions
CN111224985A (en
Inventor
史建琦
黄滟鸿
张继
任建鹏
于会新
杨洋
张鹏
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shanghai Formal Tech Information Technology Co ltd
Original Assignee
Shanghai Formal Tech Information Technology Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Shanghai Formal Tech Information Technology Co ltd filed Critical Shanghai Formal Tech Information Technology Co ltd
Priority to CN202010011586.7A priority Critical patent/CN111224985B/en
Publication of CN111224985A publication Critical patent/CN111224985A/en
Application granted granted Critical
Publication of CN111224985B publication Critical patent/CN111224985B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/12Applying verification of the received information
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/12Applying verification of the received information
    • H04L63/123Applying verification of the received information received data contents, e.g. message integrity

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Stored Programmes (AREA)

Abstract

本发明公开了一种通信协议可信性验证方法,包括:通过形式化语言描述满足安全传输指标的需求规范,得到形式化语言描述的需求规范;通过形式化验证工具对所述形式化语言描述的需求规范进行验证,得到验证数据集;根据所述验证数据集,进行规范检测。通过上述方法,可以利用形式化验证工具对需求规范进行验证,以保证计算平台系统数据通信的安全性和可靠性。

Figure 202010011586

The invention discloses a method for verifying the credibility of a communication protocol. The requirements specification is verified, and a verification data set is obtained; according to the verification data set, the specification detection is carried out. Through the above method, the requirement specification can be verified by using the formal verification tool, so as to ensure the security and reliability of the data communication of the computing platform system.

Figure 202010011586

Description

通信协议可信性验证方法Communication Protocol Credibility Verification Method

技术领域technical field

本发明涉及通信技术领域,特别涉及一种通信协议可信性验证方法。The present invention relates to the technical field of communication, in particular to a method for verifying the credibility of a communication protocol.

背景技术Background technique

计算平台系统在如今的工业和生活等多个领域发挥着重要的作用,除了传统的个人计算机领域,在如今的智能工厂、智能驾驶等新兴技术领域也占据着十分重要的地位。值得注意的是,如今的计算平台不再是简单的单个节点的运行,如今的计算节点是网络化系统化的,计算平台系统间通过数据通信组成一个功能强大的平台系统,计算平台系统间可靠的数据通信是保证整个软件安全运行的基础,计算平台系统间的通信是通过平台的通信协议来进行约束的。Computing platform systems play an important role in many fields such as industry and life today. In addition to the traditional personal computer field, they also occupy a very important position in emerging technology fields such as smart factories and smart driving. It is worth noting that today's computing platform is no longer a simple operation of a single node. Today's computing nodes are networked and systematic. The computing platform systems form a powerful platform system through data communication, and the computing platform systems are reliable. The data communication is the basis to ensure the safe operation of the entire software, and the communication between computing platform systems is constrained by the platform's communication protocol.

在传统计算平台系统的通信协议中人们普遍通过使用自然语言对其进行描述,自然语言虽然具备容易理解,方便等优点,但是也具有较多的致命缺点,例如,自然语言精确性不高,不够严格以及多义性等,这样会造成不同人对协议描述存在完全不同的理解,从而出现错误通信协议。为了达到数据传输安全可靠的目的,采取对通信协议进行验证的方式,可以极大限度地检测错误和缺陷,通信协议验证包括非形式化验证和形式化验证,非形式化验证往往缺乏数学的严密性和科学性,很难保证验证结果的质量。In the communication protocols of traditional computing platform systems, people generally use natural language to describe them. Although natural language has the advantages of being easy to understand and convenient, it also has many fatal shortcomings. Strictness and ambiguity, etc., will cause different people to have completely different understandings of the protocol description, resulting in incorrect communication protocols. In order to achieve the purpose of safe and reliable data transmission, the method of verifying the communication protocol can detect errors and defects to the greatest extent. Communication protocol verification includes informal verification and formal verification. Informal verification often lacks mathematical rigor. It is difficult to guarantee the quality of the verification results due to the nature and scientific nature.

发明内容SUMMARY OF THE INVENTION

本公开实施例提供了一种通信协议可信性验证方法。为了对披露的实施例的一些方面有一个基本的理解,下面给出了简单的概括。该概括部分不是泛泛评述,也不是要确定关键/重要组成元素或描绘这些实施例的保护范围。其唯一目的是用简单的形式呈现一些概念,以此作为后面的详细说明的序言。The embodiments of the present disclosure provide a method for verifying the credibility of a communication protocol. In order to provide a basic understanding of some aspects of the disclosed embodiments, a brief summary is given below. This summary is not intended to be an extensive review, nor is it intended to identify key/critical elements or delineate the scope of protection of these embodiments. Its sole purpose is to present some concepts in a simplified form as a prelude to the detailed description that follows.

第一方面,本公开实施例提供了一种通信协议可信性验证方法,包括:In a first aspect, an embodiment of the present disclosure provides a method for verifying the credibility of a communication protocol, including:

通过形式化语言描述满足安全传输指标的需求规范,得到形式化语言描述的需求规范;The requirement specification that meets the security transmission index is described by the formal language, and the requirement specification described by the formal language is obtained;

通过形式化验证工具对形式化语言描述的需求规范进行验证,得到验证数据集;Validate the requirements specification described in the formal language through the formal verification tool, and obtain the verification data set;

根据验证数据集,进行规范检测。Based on the validation dataset, canonical detection is performed.

进一步地,安全传输指标的需求包括:Further, the requirements for safe transmission of indicators include:

系统接口需求、用户界面需求、硬件接口需求、软件接口需求、通信接口需求。System interface requirements, user interface requirements, hardware interface requirements, software interface requirements, and communication interface requirements.

进一步地,通过形式化语言描述满足安全传输指标的需求规范,得到形式化语言描述的需求规范,包括:Further, the requirement specification that meets the security transmission index is described by the formal language, and the requirement specification described in the formal language is obtained, including:

对满足安全传输指标的需求规范进行词法分析、语法分析、语义分析,得到分析结果;Perform lexical analysis, grammatical analysis, and semantic analysis on the requirements specifications that meet the security transmission indicators, and obtain the analysis results;

通过形式化语言描述分析结果,得到形式化语言描述的需求规范。Through the formal language description analysis result, the requirement specification of formal language description is obtained.

进一步地,形式化验证工具,包括:Further, formal verification tools, including:

过程分析工具包(PAT)。Process Analysis Toolkit (PAT).

进一步地,验证数据集,包括:Further, the validation dataset includes:

正确性验证数据集、完备性验证数据集、一致性验证数据集和无歧义性验证数据集。Correctness Verification Data Set, Completeness Verification Data Set, Consistency Verification Data Set, and Unambiguity Verification Data Set.

进一步地,根据验证数据集,进行规范检测,包括:Further, according to the validation data set, perform normative detection, including:

根据正确性验证数据集,检测规范是否正确;Check whether the specification is correct according to the correctness verification data set;

根据完备性验证数据集,检测规范是否完备;Check whether the specification is complete according to the completeness verification data set;

根据一致性验证数据集,检测规范是否一致;According to the consistency verification data set, check whether the specification is consistent;

根据无歧义性验证数据集,检测规范是否无歧义。Detects whether the specification is unambiguous based on the unambiguous validation dataset.

第二方面,本公开实施例提供了一种通信协议可信性验证装置,包括:In a second aspect, an embodiment of the present disclosure provides a communication protocol credibility verification device, including:

形式化语言描述模块,用于通过形式化语言描述满足安全传输指标的需求规范,得到形式化语言描述的需求规范;The formal language description module is used to describe the requirement specification of the security transmission index through the formal language description, and obtain the requirement specification of the formal language description;

形式化验证模块,用于通过形式化验证工具对形式化语言描述的需求规范进行验证,得到验证数据集;The formal verification module is used to verify the requirement specification described in the formal language through the formal verification tool, and obtain the verification data set;

检测模块,用于根据验证数据集,进行规范检测。The detection module is used to perform normative detection according to the validation data set.

进一步地,安全传输指标的需求包括:Further, the requirements for safe transmission of indicators include:

系统接口需求、用户界面需求、硬件接口需求、软件接口需求、通信接口需求。System interface requirements, user interface requirements, hardware interface requirements, software interface requirements, and communication interface requirements.

进一步地,形式化语言描述模块,包括:Further, the formal language description module includes:

分析单元,用于对满足安全传输指标的需求规范进行词法分析、语法分析、语义分析,得到分析结果;The analysis unit is used to perform lexical analysis, syntax analysis, and semantic analysis on the requirement specification that meets the security transmission index, and obtain the analysis result;

形式化语言描述单元,用于通过形式化语言描述分析结果,得到形式化语言描述的需求规范。The formal language description unit is used to describe the analysis result through the formal language, and obtain the requirement specification of the formal language description.

进一步地,形式化验证工具,包括:Further, formal verification tools, including:

过程分析工具包(PAT)。Process Analysis Toolkit (PAT).

进一步地,验证数据集,包括:Further, the validation dataset includes:

正确性验证数据集、完备性验证数据集、一致性验证数据集和无歧义性验证数据集。Correctness Verification Data Set, Completeness Verification Data Set, Consistency Verification Data Set, and Unambiguity Verification Data Set.

进一步地,检测模块,包括:Further, the detection module includes:

正确性检测单元,用于根据正确性验证数据集,检测规范是否正确;The correctness detection unit is used to verify the data set according to the correctness to detect whether the specification is correct;

完备性检测单元,用于根据完备性验证数据集,检测规范是否完备;The completeness detection unit is used to verify the completeness of the data set according to the completeness of the detection specification;

一致性检测单元,用于根据一致性验证数据集,检测规范是否一致;The consistency detection unit is used to check whether the specification is consistent according to the consistency verification data set;

无歧义性检测单元,用于根据无歧义性验证数据集,检测规范是否无歧义。An unambiguity detection unit for detecting whether the specification is unambiguous based on the unambiguity validation dataset.

本公开实施例提供的技术方案可以包括以下有益效果:The technical solutions provided by the embodiments of the present disclosure may include the following beneficial effects:

本发明提供了一种通信协议可信性验证方法,通过形式化语言描述满足安全传输指标的需求规范,得到形式化语言描述的需求规范,通过形式化验证工具对形式化语言描述的需求规范进行验证,得到验证数据集,根据验证数据集,进行规范检测。通过上述方法,可以利用形式化验证工具对需求规范进行验证,为测试人员快速提供有效地验证计算平台系统的通信协议的方法,在功能复杂、要求严格的计算平台系统上,能够发挥积极的作用,以保证计算平台系统数据通信的安全性和可靠性。The invention provides a method for verifying the credibility of a communication protocol. The requirement specification that satisfies the security transmission index is described by a formal language, and the requirement specification of the formal language description is obtained. Validation, a validation dataset is obtained, and specification detection is performed according to the validation dataset. Through the above method, formal verification tools can be used to verify the requirement specification, which can quickly provide testers with a method to effectively verify the communication protocol of the computing platform system, and can play an active role in the computing platform system with complex functions and strict requirements. , to ensure the security and reliability of the data communication of the computing platform system.

应当理解的是,以上的一般描述和后文的细节描述仅是示例性和解释性的,并不能限制本发明。It is to be understood that both the foregoing general description and the following detailed description are exemplary and explanatory only and are not restrictive of the invention.

附图说明Description of drawings

此处的附图被并入说明书中并构成本说明书的一部分,示出了符合本发明的实施例,并与说明书一起用于解释本发明的原理。The accompanying drawings, which are incorporated in and constitute a part of this specification, illustrate embodiments consistent with the invention and together with the description serve to explain the principles of the invention.

图1是根据一示例性实施例示出的一种通信协议可信性验证方法的流程示意图;1 is a schematic flowchart of a method for verifying the credibility of a communication protocol according to an exemplary embodiment;

图2是根据一示例性实施例示出的一种通过形式化验证工具对需求规范进行验证的方法流程示意图;2 is a schematic flowchart of a method for verifying a requirement specification by a formal verification tool according to an exemplary embodiment;

图3是根据一示例性实施例示出的一种通过模型检查技术对模型的性质进行自动验证的方法流程示意图;3 is a schematic flowchart of a method for automatically verifying the properties of a model by using a model checking technology according to an exemplary embodiment;

图4是根据一示例性实施例示出的一种通信协议可信性验证装置的结构示意图;4 is a schematic structural diagram of an apparatus for verifying the credibility of a communication protocol according to an exemplary embodiment;

图5是根据一示例性实施例示出的一种检测模块的结构示意图。Fig. 5 is a schematic structural diagram of a detection module according to an exemplary embodiment.

具体实施方式Detailed ways

为了能够更加详尽地了解本公开实施例的特点与技术内容,下面结合附图对本公开实施例的实现进行详细阐述,所附附图仅供参考说明之用,并非用来限定本公开实施例。在以下的技术描述中,为方便解释起见,通过多个细节以提供对所披露实施例的充分理解。然而,在没有这些细节的情况下,一个或一个以上实施例仍然可以实施。在其它情况下,为简化附图,熟知的结构和装置可以简化展示。In order to understand the features and technical contents of the embodiments of the present disclosure in more detail, the implementation of the embodiments of the present disclosure will be described in detail below with reference to the accompanying drawings, which are for reference only and are not intended to limit the embodiments of the present disclosure. In the following technical description, for the convenience of explanation, numerous details are provided to provide a thorough understanding of the disclosed embodiments. However, one or more embodiments may be practiced without these details. In other instances, well-known structures and devices may be shown simplified in order to simplify the drawings.

实施例一:Example 1:

图1是根据一示例性实施例示出的一种通信协议可信性验证方法的流程示意图;1 is a schematic flowchart of a method for verifying the credibility of a communication protocol according to an exemplary embodiment;

在一些实施例中,一种通信协议可信性验证方法,包括:In some embodiments, a communication protocol credibility verification method, comprising:

步骤S101、通过形式化语言描述满足安全传输指标的需求规范,得到形式化语言描述的需求规范;Step S101, describing the requirement specification that satisfies the security transmission index through the formal language description, and obtaining the requirement specification described in the formal language;

在一些可选地实施例中,计算平台不再是简单的单个节点的运行,如今的计算节点是网络化系统化的,计算平台系统间通过数据通信组成一个功能强大的平台系统,计算平台系统间可靠的数据通信是保证整个软件安全运行的基础,计算平台系统间的通信是通过平台的通信协议来进行约束的。通信协议是指双方实体完成通信或服务所必须遵守的规则和约定,协议定义了数据单元使用的格式,信息单元应该包含的信息与含义,连接方式,信息发送和接收的时序,从而确保网络中数据顺利地传送到确定的地方。在计算机通信中,通信协议用于实现计算机与网络连接之间的标准,网络如果没有统一的通信协议,电脑之间的信息传递就无法识别,通信协议是指通信各方事前约定的通信规则,可以简单地理解为各计算机之间进行相互会话所使用的共同语言,两台计算机在进行通信时,必须使用的通信协议。In some optional embodiments, the computing platform is no longer a simple operation of a single node. Today's computing nodes are networked and systematic, and the computing platform systems form a powerful platform system through data communication. The computing platform system Reliable data communication between computing platforms is the basis for ensuring the safe operation of the entire software, and the communication between computing platform systems is constrained by the platform's communication protocol. A communication protocol refers to the rules and conventions that two entities must abide by to complete communication or services. The protocol defines the format used by the data unit, the information and meaning that the information unit should contain, the connection method, and the timing of information transmission and reception. The data is transferred smoothly to the determined place. In computer communication, the communication protocol is used to realize the standard between the computer and the network connection. If the network does not have a unified communication protocol, the information transmission between the computers cannot be recognized. The communication protocol refers to the communication rules agreed by the parties in advance. It can be simply understood as the common language used by each computer to communicate with each other, and the communication protocol that must be used when two computers communicate.

对于复杂的计算平台系统,系统之间的安全可靠的传输是必须的。一个完整的协议规范应该明确包含五个部分:服务,协议所能提供的服务;设定,对协议执行环境的设定;词汇,现实协议所需的数据包的集合;编码,词汇中的每个数据包的编码格式;程序规则,保证数据报一致性交换的规则。For complex computing platform systems, safe and reliable transmission between systems is a must. A complete protocol specification should clearly contain five parts: services, the services that the protocol can provide; settings, the settings for the execution environment of the protocol; vocabulary, the collection of data packets required by the actual protocol; encoding, each of the vocabulary in the vocabulary. Encoding format of each data packet; procedural rules, rules to ensure consistent exchange of datagrams.

具体地,根据数据安全传输的需求,制定满足安全传输指标的需求规范,其中,需求来源于计算平台系统间的通信协议规范,需求为功能性需求,包括系统接口需求、用户界面需求、硬件接口需求、软件接口需求、通信接口需求、内存需求和运行需求。Specifically, according to the requirements of data security transmission, formulate requirements specifications that meet the security transmission indicators, wherein the requirements are derived from the communication protocol specifications between computing platform systems, and the requirements are functional requirements, including system interface requirements, user interface requirements, and hardware interface requirements. Requirements, software interface requirements, communication interface requirements, memory requirements, and operational requirements.

通过形式化语言描述满足安全传输指标的需求规范。非形式化描述指的是使用自然语言对我们的数据安全传输需求规范进行描述,在传统计算平台系统的通信协议中人们普遍通过使用自然语言对其进行描述,自然语言虽然具备容易理解,方便等优点,但是也具有较多的致命缺点,例如,自然语言精确性不高,不够严格以及多义性等,这样会造成不同人对协议描述存在完全不同的理解,从而出现错误通信协议。形式化描述相比于非形式化描述具有更加精确,更加严格的特点。Requirement specification to meet secure transmission metrics is described in a formal language. Informal description refers to the use of natural language to describe the specification of our data security transmission requirements. In the communication protocol of traditional computing platform systems, people generally use natural language to describe it. Although natural language is easy to understand, convenient, etc. It has many advantages, but it also has many fatal disadvantages. For example, natural language is not accurate enough, not strict enough, and ambiguous, etc., which will cause different people to have completely different understandings of the protocol description, resulting in incorrect communication protocols. Formal description is more precise and stricter than informal description.

具体地,在利用形式化语言对需求规范进行描述时,首先对满足安全传输指标的需求规范进行词法分析、语法分析、语义分析,得到分析结果,通过形式化语言描述分析结果,对于一个给定的形式化描述语言,我们选择适当的语义抽象函数,建立形式化描述和等价类中的被描述对象的关系,这个关系定义描述对象的一个方面,在实际的应用中,通过使用不同的语义抽象函数,我们可以将被描述对象划分成多个等价类,使每个等价类分别与不同形式化描述语言建立抽象关系,把多个形式化描述语言集成于同一个语义域,这样我们就可以较全面地描述和分析系统地多个不同地方面,得到形式化语言描述的需求规范。Specifically, when using a formal language to describe the requirement specification, first perform lexical analysis, syntax analysis, and semantic analysis on the requirement specification that meets the security transmission index, and obtain the analysis result. The analysis result is described by the formal language. For a given In the formal description language, we choose the appropriate semantic abstract function, and establish the relationship between the formal description and the described object in the equivalence class. This relationship defines an aspect of the description object. In practical applications, by using different semantics Abstract function, we can divide the described object into multiple equivalence classes, make each equivalence class establish an abstract relationship with different formal description languages, and integrate multiple formal description languages into the same semantic domain, so that we can It can describe and analyze many different aspects of the system more comprehensively, and obtain the requirement specification described by formal language.

在形式化描述步骤中使用形式化的语言对需求进行形式化建模描述。对协议进行建模时,我们可以为每一类节点赋予一个模型,并用进程代数描述语言对这些进程模型之间的通信进行描述。通过初始化异步帧消息的调度请求,以及对协议中的调度算法的建模,完成协议周期中,调度帧信息的模拟,整个协议模型由这些不同类型节点的进程的并发组成。In the formal description step, the requirements are formally modeled and described using a formal language. When modeling the protocol, we can assign a model to each type of node, and use the process algebraic description language to describe the communication between these process models. By initializing the scheduling request of the asynchronous frame message and modeling the scheduling algorithm in the protocol, the simulation of the scheduling frame information in the protocol cycle is completed. The entire protocol model is composed of the concurrency of the processes of these different types of nodes.

通过上述方法,得到用形式化语言描述的需求规范,可以更加精确具体的描述数据通信协议之间的需求规范。Through the above method, a requirement specification described in a formal language is obtained, and the requirement specification between data communication protocols can be described more precisely and concretely.

步骤S102、通过形式化验证工具对形式化语言描述的需求规范进行验证,得到验证数据集;Step S102, verifying the requirement specification described in the formal language by a formal verification tool to obtain a verification data set;

通常,通信协议验证包括非形式化验证和形式化验证,非形式化验证往往缺乏数学的严密性和科学性,很难保证验证结果的质量,形式化验证则可以通过数学分析的方法来发现通信协议描述不一致、不明确或不完整之处。其中,形式化验证工具为PAT(processanalysis toolkit,过程分析工具包)。Usually, communication protocol verification includes informal verification and formal verification. Informal verification often lacks mathematical rigor and scientificity, and it is difficult to ensure the quality of verification results. Formal verification can be used to discover communication through mathematical analysis. The agreement description is inconsistent, unclear or incomplete. Among them, the formal verification tool is PAT (processanalysis toolkit, process analysis toolkit).

具体地,利用形式化建模语言对通信协议的基本要素、网络运行机制等进行形式化建模后,再利用一定的规则推理或者空间搜索对其进行严密而全面的分析。Specifically, after formal modeling of the basic elements of the communication protocol, network operation mechanism, etc., using a formal modeling language, certain rule reasoning or spatial search are used to analyze them rigorously and comprehensively.

图2是根据一示例性实施例示出的一种通过形式化验证工具对需求规范进行验证的方法流程示意图;2 is a schematic flowchart of a method for verifying a requirement specification by a formal verification tool according to an exemplary embodiment;

在本公开实施例中,具体的形式化验证步骤如图2所示,S201根据模型仿真器来对通信协议进行仿真,S202构建模型检查算法库,模型检查算法库包括对所有类型的协议模型的验证算法,例如对概率模型、时间模型等分别有不同的模型检查算法。S203通过模型检查技术对模型的性质进行自动验证。形式化验证步骤主要依赖的是模型检查技术。模型检查技术是针对并发系统的一种自动验证技术,系统用有限的状态结构表示,被验证的性质可以采用多种逻辑进行描述,例如时态逻辑,验证过程是对涉及的状态空间进行搜索的过程,该过程确定被验证的性质在状态空间中的可达性或不可达性。In the embodiment of the present disclosure, the specific formal verification steps are shown in FIG. 2 , S201 simulates the communication protocol according to the model simulator, S202 builds a model checking algorithm library, and the model checking algorithm library includes all types of protocol models. Verification algorithms, such as different model checking algorithms for probabilistic models, time models, etc. S203 automatically verifies the properties of the model through model checking technology. The formal verification step mainly relies on model checking techniques. Model checking technology is an automatic verification technology for concurrent systems. The system is represented by a finite state structure, and the properties to be verified can be described by a variety of logics, such as temporal logic. The verification process searches the state space involved. Process that determines the reachability or unreachability of the verified property in the state space.

图3是根据一示例性实施例示出的一种通过模型检查技术对模型的性质进行自动验证的方法流程示意图;3 is a schematic flowchart of a method for automatically verifying the properties of a model by using a model checking technology according to an exemplary embodiment;

如图3所示,在利用模型检查技术对模型的性质进行验证时,包括对构建的通信协议模型进行静态分析、动态分析,动态分析又包括逻辑证明、可达性分析、模拟,其中,逻辑证明包括不变性证明和等价性证明,可达性分析包括全局验证和局部验证。As shown in Figure 3, when using model checking technology to verify the properties of the model, it includes static analysis and dynamic analysis of the constructed communication protocol model, and dynamic analysis includes logic proof, reachability analysis, and simulation. Proofs include invariance proofs and equivalence proofs, and reachability analysis includes global verification and local verification.

通过上述方法,可以得到验证数据集。Through the above method, a validation dataset can be obtained.

步骤S103、根据验证数据集,进行规范检测。Step S103 , performing specification detection according to the verification data set.

规范检测是在通信协议进行验证之后进行的,通过对计算平台系统的通信协议可信性进行验证之后,我们得到了通信协议的验证数据集,然后分别从协议的正确性、完备性、一致性和无歧义性四个方面对系统间的数据安全传输进行检测。The specification detection is carried out after the verification of the communication protocol. After verifying the credibility of the communication protocol of the computing platform system, we obtain the verification data set of the communication protocol, and then analyze the correctness, completeness and consistency of the protocol respectively. And four aspects of unambiguity are used to detect the safe transmission of data between systems.

其中,根据正确性验证数据集,检测规范是否正确,主要检测正确性验证数据集中的每一项需求是否都是软件应该满足的需求,当每一项需求都是软件应该满足的需求,则该验证数据集具备正确性,否则,该验证数据集不具备正确性。Among them, according to the correctness verification data set, check whether the specification is correct, mainly to check whether each requirement in the correctness verification data set is a requirement that the software should meet, and when each requirement is a requirement that the software should meet, then the The validation dataset is correct, otherwise, the validation dataset is not correct.

根据完备性验证数据集,检测规范是否完备,主要检测完备性验证数据集中的需求是否包含所有重要需求、软件响应的定义、所有图表的全面标记和索引,当包含所有上述需求、定义、标记和索引时,则该验证数据集具备完备性,否则,该验证数据集不具备完备性。According to the completeness verification data set, check whether the specification is complete, mainly check whether the requirements in the completeness verification data set include all important requirements, the definition of software response, the comprehensive marking and indexing of all diagrams, when all the above requirements, definitions, markings and indexes are included. When indexing, the validation data set is complete, otherwise, the validation data set is not complete.

根据一致性验证数据集,检测规范是否一致,主要检测一致性验证数据集中的需求内部是否一致,当需求内部一致时,则该验证数据集具备一致性,否则,该验证数据集不具备一致性。According to the consistency verification data set, check whether the specifications are consistent, mainly to check whether the requirements in the consistency verification data set are internally consistent, when the requirements are internally consistent, the verification data set is consistent, otherwise, the verification data set does not have consistency .

根据无歧义性验证数据集,检测规范是否无歧义,主要检测无歧义性验证数据集中的每一项需求是否都只有一种解释,当每一项需求都只有一种解释时,则该验证数据集具备无歧义性,否则,该验证数据集不具备无歧义性。According to the unambiguous verification data set, check whether the specification is unambiguous, mainly to check whether each requirement in the unambiguous verification data set has only one interpretation, when each requirement has only one interpretation, then the verification data The set is unambiguous, otherwise, the validation dataset is not unambiguous.

通过上述方法,可以对验证数据集进行规范检测。With the above method, canonical detection can be performed on the validation dataset.

进一步地,安全传输指标的需求包括:Further, the requirements for safe transmission of indicators include:

系统接口需求、用户界面需求、硬件接口需求、软件接口需求、通信接口需求。System interface requirements, user interface requirements, hardware interface requirements, software interface requirements, and communication interface requirements.

具体地,根据数据安全传输的需求,制定满足安全传输指标的需求规范,其中,需求来源于计算平台系统间的通信协议规范,需求为功能性需求,包括系统接口需求、用户界面需求、硬件接口需求、软件接口需求、通信接口需求、内存需求和运行需求。Specifically, according to the requirements of data security transmission, formulate requirements specifications that meet the security transmission indicators, wherein the requirements are derived from the communication protocol specifications between computing platform systems, and the requirements are functional requirements, including system interface requirements, user interface requirements, and hardware interface requirements. Requirements, software interface requirements, communication interface requirements, memory requirements, and operational requirements.

进一步地,通过形式化语言描述满足安全传输指标的需求规范,得到形式化语言描述的需求规范,包括:Further, the requirement specification that meets the security transmission index is described by the formal language, and the requirement specification described in the formal language is obtained, including:

对满足安全传输指标的需求规范进行词法分析、语法分析、语义分析,得到分析结果;Perform lexical analysis, grammatical analysis, and semantic analysis on the requirements specifications that meet the security transmission indicators, and obtain the analysis results;

通过形式化语言描述分析结果,得到形式化语言描述的需求规范。Through the formal language description analysis result, the requirement specification of formal language description is obtained.

具体地,在利用形式化语言对需求规范进行描述时,首先对满足安全传输指标的需求规范进行词法分析、语法分析、语义分析,得到分析结果,通过形式化语言描述分析结果,对于一个给定的形式化描述语言,我们选择适当的语义抽象函数,建立形式化描述和等价类中的被描述对象的关系,这个关系定义描述对象的一个方面,在实际的应用中,通过使用不同的语义抽象函数,我们可以将被描述对象划分成多个等价类,使每个等价类分别与不同形式化描述语言建立抽象关系,把多个形式化描述语言集成于同一个语义域,这样我们就可以较全面地描述和分析系统地多个不同地方面,得到形式化语言描述的需求规范。Specifically, when using a formal language to describe the requirement specification, first perform lexical analysis, syntax analysis, and semantic analysis on the requirement specification that meets the security transmission index, and obtain the analysis result. The analysis result is described by the formal language. For a given In the formal description language, we choose the appropriate semantic abstract function, and establish the relationship between the formal description and the described object in the equivalence class. This relationship defines an aspect of the description object. In practical applications, by using different semantics Abstract function, we can divide the described object into multiple equivalence classes, make each equivalence class establish an abstract relationship with different formal description languages, and integrate multiple formal description languages into the same semantic domain, so that we can It can describe and analyze many different aspects of the system more comprehensively, and obtain the requirement specification described by formal language.

在形式化描述步骤中使用形式化的语言对需求进行形式化建模描述。对协议进行建模时,我们可以为每一类节点赋予一个模型,并用进程代数描述语言对这些进程模型之间的通信进行描述。通过初始化异步帧消息的调度请求,以及对协议中的调度算法的建模,完成协议周期中,调度帧信息的模拟,整个协议模型由这些不同类型节点的进程的并发组成。In the formal description step, the requirements are formally modeled and described using a formal language. When modeling the protocol, we can assign a model to each type of node, and use the process algebraic description language to describe the communication between these process models. By initializing the scheduling request of the asynchronous frame message and modeling the scheduling algorithm in the protocol, the simulation of the scheduling frame information in the protocol cycle is completed. The entire protocol model is composed of the concurrency of processes of these different types of nodes.

通过上述方法,得到用形式化语言描述的需求规范,可以更加精确具体的描述数据通信协议之间的需求规范。Through the above method, a requirement specification described in a formal language is obtained, and the requirement specification between data communication protocols can be described more precisely and concretely.

进一步地,形式化验证工具,包括:Further, formal verification tools, including:

过程分析工具包(PAT)。Process Analysis Toolkit (PAT).

进一步地,验证数据集,包括:Further, the validation dataset includes:

正确性验证数据集、完备性验证数据集、一致性验证数据集和无歧义性验证数据集。Correctness Verification Data Set, Completeness Verification Data Set, Consistency Verification Data Set, and Unambiguity Verification Data Set.

进一步地,根据验证数据集,进行规范检测,包括:Further, according to the validation data set, perform normative detection, including:

根据正确性验证数据集,检测规范是否正确;Check whether the specification is correct according to the correctness verification data set;

根据完备性验证数据集,检测规范是否完备;Check whether the specification is complete according to the completeness verification data set;

根据一致性验证数据集,检测规范是否一致;According to the consistency verification data set, check whether the specification is consistent;

根据无歧义性验证数据集,检测规范是否无歧义。Detects whether the specification is unambiguous based on the unambiguous validation dataset.

规范检测是在通信协议进行验证之后进行的,通过对计算平台系统的通信协议可信性进行验证之后,我们得到了通信协议的验证数据集,然后分别从协议的正确性、完备性、一致性和无歧义性四个方面对系统间的数据安全传输进行检测。The specification detection is carried out after the verification of the communication protocol. After verifying the credibility of the communication protocol of the computing platform system, we obtain the verification data set of the communication protocol, and then analyze the correctness, completeness and consistency of the protocol respectively. And four aspects of unambiguity are used to detect the safe transmission of data between systems.

其中,根据正确性验证数据集,检测规范是否正确,主要检测正确性验证数据集中的每一项需求是否都是软件应该满足的需求,当每一项需求都是软件应该满足的需求,则该验证数据集具备正确性,否则,该验证数据集不具备正确性。Among them, according to the correctness verification data set, check whether the specification is correct, mainly to check whether each requirement in the correctness verification data set is a requirement that the software should meet, and when each requirement is a requirement that the software should meet, then the The validation dataset is correct, otherwise, the validation dataset is not correct.

根据完备性验证数据集,检测规范是否完备,主要检测完备性验证数据集中的需求是否包含所有重要需求、软件响应的定义、所有图表的全面标记和索引,当包含所有上述需求、定义、标记和索引时,则该验证数据集具备完备性,否则,该验证数据集不具备完备性。According to the completeness verification data set, check whether the specification is complete, mainly check whether the requirements in the completeness verification data set include all important requirements, the definition of software response, the comprehensive marking and indexing of all diagrams, when all the above requirements, definitions, markings and indexes are included. When indexing, the validation data set is complete, otherwise, the validation data set is not complete.

根据一致性验证数据集,检测规范是否一致,主要检测一致性验证数据集中的需求内部是否一致,当需求内部一致时,则该验证数据集具备一致性,否则,该验证数据集不具备一致性。According to the consistency verification data set, check whether the specifications are consistent, mainly to check whether the requirements in the consistency verification data set are internally consistent, when the requirements are internally consistent, the verification data set is consistent, otherwise, the verification data set does not have consistency .

根据无歧义性验证数据集,检测规范是否无歧义,主要检测无歧义性验证数据集中的每一项需求是否都只有一种解释,当每一项需求都只有一种解释时,则该验证数据集具备无歧义性,否则,该验证数据集不具备无歧义性。According to the unambiguous verification data set, check whether the specification is unambiguous, mainly to check whether each requirement in the unambiguous verification data set has only one interpretation, when each requirement has only one interpretation, then the verification data The set is unambiguous, otherwise, the validation dataset is not unambiguous.

通过上述方法,可以对验证数据集进行规范检测。With the above method, canonical detection can be performed on the validation dataset.

实施例二:Embodiment 2:

在优选实施例中,应用本发明基于计算平台系统的通信协议可信验证方法对计算平台间的Powerlink协议进行可信验证。In a preferred embodiment, the trusted verification method of the communication protocol based on the computing platform system of the present invention is used to perform trusted verification on the Powerlink protocol between computing platforms.

开源实时通信技术Powerlink是一项在标准以太网介质上,用于解决工业控制及数据采集领域数据传输实时性的实时以太网协议,该协议主要规定了数据链层上的通信,该协议支持周期通信和非周期通信,其中一个协议循环周期主要包括等时同步阶段和异步通信阶段,周期通信发生在等时同步阶段,而非周期通信发生在异步通信阶段,Powerlink中包含两类通信节点,主站节点和从站节点,并且根据从站在等时同步阶段中与主站节点不同的通信机制,从站又划分为了三类节点,Normal节点,PRC节点及复用节点。此外,在该协议中存在五类帧信息,异步过程中存在对帧消息发送请求的调度。在应用本发明基于计算平台系统的通信协议可信验证方法对Powerlink协议进行可信验证的过程中:The open source real-time communication technology Powerlink is a real-time Ethernet protocol used to solve the real-time data transmission in the field of industrial control and data acquisition on the standard Ethernet medium. The protocol mainly specifies the communication on the data link layer. Communication and aperiodic communication. One protocol cycle mainly includes the isochronous phase and the asynchronous communication phase. The periodic communication occurs in the isochronous phase, and the aperiodic communication occurs in the asynchronous communication phase. Powerlink contains two types of communication nodes. The station node and the slave node, and according to the different communication mechanism between the slave and the master node in the isochronous phase, the slave is divided into three types of nodes, Normal node, PRC node and multiplexing node. In addition, there are five types of frame information in this protocol, and there is scheduling of frame message sending requests in the asynchronous process. In the process of applying the trusted verification method of the communication protocol based on the computing platform system of the present invention to carry out the trusted verification to the Powerlink protocol:

首先,需要获得协议执行的规范以及协议需要满足的数据传输的安全要求,便于之后对协议的建模。在Powerlink协议中对所需要满足的性质包括无死锁性、无任务的“饥饿”等待、实时性等。First, it is necessary to obtain the specification of the protocol execution and the security requirements of the data transmission that the protocol needs to meet, so as to facilitate the modeling of the protocol later. The properties that need to be satisfied in the Powerlink protocol include no deadlock, no task "starvation" waiting, real-time and so on.

然后,在形式化描述步骤中使用形式化的语言对需求进行形式化建模描述。对协议进行建模时,我们可以为每一类节点赋予一个模型,并用进程代数描述语言对这些进程模型之间的通信进行描述。通过初始化异步帧消息的调度请求,以及对协议中的调度算法的建模,完成协议周期中,调度帧信息的模拟。整个协议模型由这些不同类型节点的进程的并发组成。对协议需求进行建模,通过时态逻辑、计算树逻辑等描述协议的无死锁性、无任务的“饥饿”等待、实时性等特征。Then, in the formal description step, the requirements are formally modeled and described using a formal language. When modeling the protocol, we can assign a model to each type of node, and use the process algebraic description language to describe the communication between these process models. By initializing the scheduling request of the asynchronous frame message and modeling the scheduling algorithm in the protocol, the simulation of the scheduling frame information in the protocol cycle is completed. The entire protocol model consists of the concurrency of processes of these different types of nodes. Model the protocol requirements, and describe the protocol's deadlock-free, task-free "starvation" waiting, and real-time characteristics through temporal logic and computational tree logic.

其次,开始对协议进行验证。形式化验证步骤中一个重要的功能是,根据协议模型和协议需求的形式化表示,对协议所满足的性质进行验证。仿真过程可以呈现所有模型可能执行的路径及状态空间。每个状态可以提供对该状态下所有变量的当前值的提示,状态之间的迁移提示用户协议运行过程中发生的动作。用户可以通过对不同进程的仿真进行建模代码的调试分析。如果发生死锁,在仿真结果中也能非常直观地观察到发生死锁的位置及发生死锁的原因。Second, start verifying the protocol. An important function of the formal verification step is to verify the properties satisfied by the protocol according to the protocol model and the formal representation of the protocol requirements. The simulation process can represent all possible paths and state spaces of model execution. Each state can provide hints about the current values of all variables in that state, and transitions between states hint at actions that take place during the operation of the user protocol. Users can debug and analyze the modeling code by simulating different processes. If a deadlock occurs, the location of the deadlock and the reason for the deadlock can also be observed intuitively in the simulation results.

最后,验证结果输出到需求规范评估步骤进行处理。针对Powerlink协议,可以验证该协议中是否存在死锁,是否会有调度请求一直得不到调度,以及调度请求的顺序是否满足优先级设定等来评估需求规范的正确性、完备性、一致性和无歧义性。Finally, the verification results are output to the requirements specification evaluation step for processing. For the Powerlink protocol, you can verify whether there is a deadlock in the protocol, whether there are scheduling requests that have not been scheduled, and whether the order of scheduling requests satisfies the priority setting, etc. to evaluate the correctness, completeness, and consistency of the requirements specification. and unambiguous.

实施例三:Embodiment three:

本公开实施例提供了一种通信协议可信性验证装置,图4是根据一示例性实施例示出的一种通信协议可信性验证装置的结构示意图。An embodiment of the present disclosure provides a communication protocol credibility verification apparatus, and FIG. 4 is a schematic structural diagram of a communication protocol credibility verification apparatus according to an exemplary embodiment.

如图4所示,一种通信协议可信性验证装置,包括:As shown in Figure 4, a communication protocol credibility verification device, comprising:

S401形式化语言描述模块,用于通过形式化语言描述满足安全传输指标的需求规范,得到形式化语言描述的需求规范;S401 Formal language description module, which is used to describe the requirement specification of the security transmission index through formal language description, and obtain the requirement specification of formal language description;

S402形式化验证模块,用于通过形式化验证工具对所述形式化语言描述的需求规范进行验证,得到验证数据集;S402 a formal verification module, used for verifying the requirement specification described in the formal language through a formal verification tool to obtain a verification data set;

S403检测模块,用于根据所述验证数据集,进行规范检测。S403, a detection module, configured to perform specification detection according to the verification data set.

进一步地,安全传输指标的需求包括:Further, the requirements for safe transmission of indicators include:

系统接口需求、用户界面需求、硬件接口需求、软件接口需求、通信接口需求。System interface requirements, user interface requirements, hardware interface requirements, software interface requirements, and communication interface requirements.

进一步地,所述形式化语言描述模块,包括:Further, the formal language description module includes:

分析单元,用于对所述满足安全传输指标的需求规范进行词法分析、语法分析、语义分析,得到分析结果;an analysis unit, configured to perform lexical analysis, syntax analysis, and semantic analysis on the requirement specification that meets the security transmission index, and obtain an analysis result;

形式化语言描述单元,用于通过形式化语言描述所述分析结果,得到形式化语言描述的需求规范。The formal language description unit is used to describe the analysis result through the formal language to obtain the requirement specification described by the formal language.

进一步地,所述形式化验证工具,包括:Further, the formal verification tool includes:

过程分析工具包(PAT)。Process Analysis Toolkit (PAT).

进一步地,所述验证数据集,包括:Further, the verification data set includes:

正确性验证数据集、完备性验证数据集、一致性验证数据集和无歧义性验证数据集。Correctness Verification Data Set, Completeness Verification Data Set, Consistency Verification Data Set, and Unambiguity Verification Data Set.

进一步地,所述检测模块,包括:Further, the detection module includes:

S403-1正确性检测单元,用于根据正确性验证数据集,检测规范是否正确;S403-1 Correctness detection unit, used to verify the data set according to the correctness, and detect whether the specification is correct;

S403-2完备性检测单元,用于根据完备性验证数据集,检测规范是否完备;S403-2 Completeness detection unit, which is used to verify the completeness of the data set according to the completeness of the detection specification;

S403-3一致性检测单元,用于根据一致性验证数据集,检测规范是否一致;S403-3 Consistency detection unit, which is used to verify whether the specifications are consistent according to the consistency verification data set;

S403-4无歧义性检测单元,用于根据无歧义性验证数据集,检测规范是否无歧义。S403-4 The unambiguous detection unit is used to detect whether the specification is unambiguous according to the unambiguity verification data set.

本公开实施例提供的一种通信协议可信性验证装置,执行上述实施例提供的一种通信协议可信性验证方法,在此不再详细阐述。A communication protocol credibility verification apparatus provided by an embodiment of the present disclosure executes the communication protocol credibility verification method provided by the above-mentioned embodiments, and will not be described in detail here.

需要说明的是:It should be noted:

在此提供的算法和显示不与任何特定计算机、虚拟装置或者其它设备固有相关。各种通用装置也可以与基于在此的示教一起使用。根据上面的描述,构造这类装置所要求的结构是显而易见的。此外,本发明也不针对任何特定编程语言。应当明白,可以利用各种编程语言实现在此描述的本发明的内容,并且上面对特定语言所做的描述是为了披露本发明的最佳实施方式。The algorithms and displays provided herein are not inherently related to any particular computer, virtual appliance, or other device. Various general-purpose devices can also be used with the teachings based on this. The structure required to construct such a device is apparent from the above description. Furthermore, the present invention is not directed to any particular programming language. It should be understood that various programming languages may be used to implement the inventions described herein, and that the descriptions of specific languages above are intended to disclose the best mode for carrying out the invention.

在此处所提供的说明书中,说明了大量具体细节。然而,能够理解,本发明的实施例可以在没有这些具体细节的情况下实践。在一些实例中,并未详细示出公知的系统、结构和技术,以便不模糊对本说明书的理解。In the description provided herein, numerous specific details are set forth. It will be understood, however, that embodiments of the invention may be practiced without these specific details. In some instances, well-known systems, structures and techniques have not been shown in detail in order not to obscure an understanding of this description.

类似地,应当理解,为了精简本公开并帮助理解各个发明方面中的一根或多根,在上面对本发明的示例性实施例的描述中,本发明的各个特征有时被一起分组到单个实施例、图、或者对其的描述中。然而,并不应将该公开的系统解释成反映如下意图:即所要求保护的本发明要求比在每个权利要求中所明确记载的特征更多的特征。更确切地说,如下面的权利要求书所反映的那样,发明方面在于少于前面公开的单个实施例的所有特征。因此,遵循具体实施方式的权利要求书由此明确地并入该具体实施方式,其中每个权利要求本身都作为本发明的单独实施例。Similarly, it is to be understood that, in the above description of exemplary embodiments of the invention, various features of the invention are sometimes grouped together into a single embodiment in order to simplify the disclosure and to aid in the understanding of one or more of the various inventive aspects. , figures, or descriptions thereof. However, this disclosed system should not be construed to reflect the intention that the invention as claimed requires more features than are expressly recited in each claim. Rather, as the following claims reflect, inventive aspects lie in less than all features of a single foregoing disclosed embodiment. Thus, the claims following the Detailed Description are hereby expressly incorporated into this Detailed Description, with each claim standing on its own as a separate embodiment of this invention.

本领域那些技术人员可以理解,可以对实施例中的设备中的步骤进行自适应性地改变并且把它们设置在与该实施例不同的一根或多根设备中。可以把实施例中的步骤或步骤或组件组合成一个步骤或步骤或组件,以及此外可以把它们分成多个步骤或子步骤或子组件。除了这样的特征和/或过程或者步骤中的至少一些是相互排斥之外,可以采用任何组合对本说明书(包括伴随的权利要求、摘要和附图)中公开的所有特征以及如此公开的任何系统或者设备的所有过程或步骤进行组合。除非另外明确陈述,本说明书(包括伴随的权利要求、摘要和附图)中公开的每个特征可以由提供相同、等同或相似目的的替代特征来代替。Those skilled in the art will appreciate that the steps in the devices in an embodiment can be adaptively changed and placed in one or more devices different from the embodiment. The steps or steps or components in the embodiments may be combined into one step or step or component, and further they may be divided into multiple steps or sub-steps or sub-components. All features disclosed in this specification (including accompanying claims, abstract and drawings) and any system so disclosed may be employed in any combination, unless at least some of such features and/or processes or steps are mutually exclusive. All processes or steps of the equipment are combined. Each feature disclosed in this specification (including accompanying claims, abstract and drawings) may be replaced by alternative features serving the same, equivalent or similar purpose, unless expressly stated otherwise.

此外,本领域的技术人员能够理解,尽管在此所述的一些实施例包括其它实施例中所包括的某些特征而不是其它特征,但是不同实施例的特征的组合意味着处于本发明的范围之内并且形成不同的实施例。例如,在下面的权利要求书中,所要求保护的实施例的任意之一都可以以任意的组合方式来使用。Furthermore, those skilled in the art will appreciate that although some of the embodiments described herein include certain features, but not others, included in other embodiments, that combinations of features of different embodiments are intended to be within the scope of the invention within and form different embodiments. For example, in the following claims, any of the claimed embodiments may be used in any combination.

本发明的各个部件实施例可以以硬件实现,或者以在一个或者多个处理器上运行的软件步骤实现,或者以它们的组合实现。本领域的技术人员应当理解,可以在实践中使用微处理器或者数字信号处理器(DSP)来实现根据本发明实施例的虚拟机的创建装置中的一些或者全部部件的一些或者全部功能。本发明还可以实现为用于执行这里所描述的系统的一部分或者全部的设备或者装置程序(例如,计算机程序和计算机程序产品)。这样的实现本发明的程序可以存储在计算机可读介质上,或者可以具有一个或者多个信号的形式。这样的信号可以从因特网网站上下载得到,或者在载体信号上提供,或者以任何其他形式提供。Various component embodiments of the present invention may be implemented in hardware, or in software steps running on one or more processors, or in a combination thereof. Those skilled in the art should understand that a microprocessor or a digital signal processor (DSP) may be used in practice to implement some or all functions of some or all components in the apparatus for creating a virtual machine according to the embodiment of the present invention. The present invention can also be implemented as apparatus or apparatus programs (eg, computer programs and computer program products) for executing part or all of the systems described herein. Such a program implementing the present invention may be stored on a computer-readable medium, or may be in the form of one or more signals. Such signals may be downloaded from Internet sites, or provided on carrier signals, or in any other form.

应该注意的是上述实施例对本发明进行说明而不是对本发明进行限制,并且本领域技术人员在不脱离所附权利要求的范围的情况下可设计出替换实施例。在权利要求中,不应将位于括号之间的任何参考符号构造成对权利要求的限制。单词“包含”不排除存在未列在权利要求中的元件或步骤。位于元件之前的单词“一”或“一个”不排除存在多个这样的元件。本发明可以借助于包括有若干不同元件的硬件以及借助于适当编程的计算机来实现。在列举了若干装置的步骤权利要求中,这些装置中的若干个可以是通过同一个硬件项来具体体现。单词第一、第二、以及第三等的使用不表示任何顺序。可将这些单词解释为名称。It should be noted that the above-described embodiments illustrate rather than limit the invention, and that alternative embodiments may be devised by those skilled in the art without departing from the scope of the appended claims. In the claims, any reference signs placed between parentheses shall not be construed as limiting the claim. The word "comprising" does not exclude the presence of elements or steps not listed in a claim. The word "a" or "an" preceding an element does not exclude the presence of a plurality of such elements. The invention can be implemented by means of hardware comprising several different elements and by means of a suitably programmed computer. In a step claim enumerating several means, several of these means can be embodied by one and the same item of hardware. The use of the words first, second, and third, etc. do not denote any order. These words can be interpreted as names.

以上所述,仅为本发明较佳的具体实施方式,但本发明的保护范围并不局限于此,任何熟悉本技术领域的技术人员在本发明揭露的技术范围内,可轻易想到的变化或替换,都应涵盖在本发明的保护范围之内。因此,本发明的保护范围应以所述权利要求的保护范围为准。The above description is only a preferred embodiment of the present invention, but the protection scope of the present invention is not limited to this. Substitutions should be covered within the protection scope of the present invention. Therefore, the protection scope of the present invention should be based on the protection scope of the claims.

Claims (4)

1. A method for verifying trustworthiness of a communication protocol, comprising:
performing lexical analysis, syntactic analysis and semantic analysis on the requirement specification meeting the safety transmission index to obtain an analysis result, describing the analysis result through a formal language, selecting a corresponding semantic abstract function, establishing the relationship between the formal description and a described object in an equivalence class, dividing the described object into a plurality of equivalence classes by using different semantic abstract functions, respectively establishing an abstract relationship between each equivalence class and different formal description languages, and integrating the formal description languages into the same semantic domain to obtain the requirement specification described by the formal language;
when a protocol is modeled, a model is endowed to each type of node, communication among the process models is described by using a process algebra description language, the simulation of scheduling frame information in a protocol period is completed by initializing a scheduling request of asynchronous frame information and modeling a scheduling algorithm in the protocol, and the whole protocol model is formed by the concurrence of processes of different types of nodes;
wherein, the requirements of the safe transmission index include: system interface requirements, user interface requirements, hardware interface requirements, software interface requirements, and communication interface requirements;
verifying the requirement specification described by the formal language through a formal verification tool to obtain a verification data set;
and performing specification detection according to the verification data set.
2. The method of claim 1, wherein the formal verification tool comprises:
process Analysis Toolkit (PAT).
3. The method of claim 1, wherein validating the data set comprises:
a correctness verification dataset, a completeness verification dataset, a consistency verification dataset, and a disambiguation verification dataset.
4. The method of claim 1, wherein said performing a specification test based on said validation dataset comprises:
verifying the data set according to the correctness, and detecting whether the specification is correct;
according to the completeness verification data set, detecting whether the specification is complete;
verifying the data set according to the consistency, and detecting whether the specifications are consistent;
and detecting whether the specification is unambiguous according to the unambiguous verification data set.
CN202010011586.7A 2020-01-06 2020-01-06 Communication Protocol Credibility Verification Method Active CN111224985B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202010011586.7A CN111224985B (en) 2020-01-06 2020-01-06 Communication Protocol Credibility Verification Method

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202010011586.7A CN111224985B (en) 2020-01-06 2020-01-06 Communication Protocol Credibility Verification Method

Publications (2)

Publication Number Publication Date
CN111224985A CN111224985A (en) 2020-06-02
CN111224985B true CN111224985B (en) 2022-06-03

Family

ID=70828131

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202010011586.7A Active CN111224985B (en) 2020-01-06 2020-01-06 Communication Protocol Credibility Verification Method

Country Status (1)

Country Link
CN (1) CN111224985B (en)

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US6385765B1 (en) * 1996-07-02 2002-05-07 The Research Foundation Specification and verification for concurrent systems with graphical and textual editors
CN106411635A (en) * 2016-08-29 2017-02-15 华东师范大学 Formal analysis and verification method for real-time protocol
CN106446341A (en) * 2016-08-29 2017-02-22 华东师范大学 Process algebra-based real-time protocol analysis and verification system
CN108509336A (en) * 2018-03-05 2018-09-07 华东师范大学 A kind of operating system canonical form chemical examination card and test method

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US6385765B1 (en) * 1996-07-02 2002-05-07 The Research Foundation Specification and verification for concurrent systems with graphical and textual editors
CN106411635A (en) * 2016-08-29 2017-02-15 华东师范大学 Formal analysis and verification method for real-time protocol
CN106446341A (en) * 2016-08-29 2017-02-22 华东师范大学 Process algebra-based real-time protocol analysis and verification system
CN108509336A (en) * 2018-03-05 2018-09-07 华东师范大学 A kind of operating system canonical form chemical examination card and test method

Also Published As

Publication number Publication date
CN111224985A (en) 2020-06-02

Similar Documents

Publication Publication Date Title
Jensen et al. Colored Petri nets: a graphical language for formal modeling and validation of concurrent systems
CN107783758B (en) A kind of intelligence contract engineering method
Armstrong et al. Survey of existing tools for formal verification
CN111209203B (en) Model verification method based on source code
Zave A practical comparison of Alloy and Spin
US10140403B2 (en) Managing model checks of sequential designs
Urdahl et al. Path predicate abstraction for sound system-level models of RT-level circuit designs
CN106411635A (en) Formal analysis and verification method for real-time protocol
US9430595B2 (en) Managing model checks of sequential designs
CN111400167A (en) Redfish service compliance verification method, device, equipment and medium
CN106446341A (en) Process algebra-based real-time protocol analysis and verification system
Pretschner et al. Model based testing in evolutionary software development
WO2023060978A1 (en) Autosar software verification method and apparatus, device, and storage medium
Sun et al. Adversarial generation method for smart contract fuzz testing seeds guided by chain-based LLM
CN111245676B (en) Communication protocol reliability verification device
CN111224985B (en) Communication Protocol Credibility Verification Method
CN111240972B (en) Model verification device based on source code
CN114281314A (en) Method, system and medium for converting JPSL to PPTL property specification
US10482206B1 (en) System, method, and computer program product for providing feedback during formal verification
Peng et al. A LTS Approach to Control in Event‐B
Hall et al. Omml: A behavioural model interchange format
Cai et al. Murphi2Chisel: A protocol compiler from Murphi to Chisel
US12093160B1 (en) IoT event detector correctness verification
Zhang et al. Modeling a heterogeneous embedded system in coloured Petri nets
Owen Random search of and-or graphs representing finite-state models

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant
CB03 Change of inventor or designer information
CB03 Change of inventor or designer information

Inventor after: Zhang Peng

Inventor after: Shi Jianqi

Inventor after: Huang Yanhong

Inventor after: Zhang Ji

Inventor after: Ren Jianpeng

Inventor after: Yu Huixin

Inventor after: Yang Yang

Inventor before: Shi Jianqi

Inventor before: Huang Yanhong

Inventor before: Zhang Ji

Inventor before: Ren Jianpeng

Inventor before: Yu Huixin

Inventor before: Yang Yang

Inventor before: Zhang Peng